Podcast
Questions and Answers
Which of the following is a characteristic of slotted ALOHA?
Which of the following is a characteristic of slotted ALOHA?
- Nodes can transmit at any random time.
- Transmissions must start at multiples of transmission intervals. (correct)
- Each node has equal chances to transmit.
- It eliminates all collisions.
In 1-persistent CSMA, a node always waits for the medium to be free before starting to transmit.
In 1-persistent CSMA, a node always waits for the medium to be free before starting to transmit.
True (A)
What is the approximate efficiency of slotted ALOHA?
What is the approximate efficiency of slotted ALOHA?
37%
In CSMA, nodes must ___ before they start transmitting.
In CSMA, nodes must ___ before they start transmitting.
Match the following CSMA variants with their characteristics:
Match the following CSMA variants with their characteristics:
What happens during a collision in ALOHA?
What happens during a collision in ALOHA?
The efficiency of ALOHA is higher than that of slotted ALOHA.
The efficiency of ALOHA is higher than that of slotted ALOHA.
What does CSMA stand for?
What does CSMA stand for?
What does RTS stand for in the context of transmission control?
What does RTS stand for in the context of transmission control?
In IEEE 802.11, a transmission is never successful unless an acknowledgment is received.
In IEEE 802.11, a transmission is never successful unless an acknowledgment is received.
Name the two types of access methods mentioned in the document.
Name the two types of access methods mentioned in the document.
The acknowledgment for a successful unicast transmission is sent after a ______.
The acknowledgment for a successful unicast transmission is sent after a ______.
What happens in IEEE 802.11 if a node wants to send data but detects a busy medium?
What happens in IEEE 802.11 if a node wants to send data but detects a busy medium?
Match the following terms with their corresponding descriptions:
Match the following terms with their corresponding descriptions:
What is the role of the base station in infrastructure mode?
What is the role of the base station in infrastructure mode?
CSMA/CD can operate efficiently in wireless networks.
CSMA/CD can operate efficiently in wireless networks.
What is a characteristic of CSMA/CD?
What is a characteristic of CSMA/CD?
ALOHA can be classified as a controlled access method.
ALOHA can be classified as a controlled access method.
In ___________ Ring, token passing is used to prevent collisions.
In ___________ Ring, token passing is used to prevent collisions.
Match the following access methods with their descriptions:
Match the following access methods with their descriptions:
Which of the following protocols is used in IEEE 802.11 WLAN? (Select all that apply)
Which of the following protocols is used in IEEE 802.11 WLAN? (Select all that apply)
Data frames can vary in size and do not require special boundary detection mechanisms.
Data frames can vary in size and do not require special boundary detection mechanisms.
Name one security consideration related to data link layer protocols.
Name one security consideration related to data link layer protocols.
Flashcards
Frame boundary detection
Frame boundary detection
The process of marking the beginning and end of a message in a network to ensure that messages do not get mixed up.
Code transparency
Code transparency
The ability to send data without causing errors in the way the data is interpreted by the network.
Addressing
Addressing
The process of adding information to a frame, such as the sender and receiver addresses, to help the network route the message correctly.
Error detection
Error detection
Signup and view all the flashcards
Frame
Frame
Signup and view all the flashcards
Framing
Framing
Signup and view all the flashcards
Data link layer
Data link layer
Signup and view all the flashcards
Sequence of bits
Sequence of bits
Signup and view all the flashcards
ALOHA
ALOHA
Signup and view all the flashcards
Slotted ALOHA
Slotted ALOHA
Signup and view all the flashcards
Reduced Critical Time Frame
Reduced Critical Time Frame
Signup and view all the flashcards
Efficiency
Efficiency
Signup and view all the flashcards
CSMA (Carrier Sense Multiple Access)
CSMA (Carrier Sense Multiple Access)
Signup and view all the flashcards
p-persistent CSMA
p-persistent CSMA
Signup and view all the flashcards
1-persistent CSMA
1-persistent CSMA
Signup and view all the flashcards
non-persistent CSMA
non-persistent CSMA
Signup and view all the flashcards
DIFS (Distributed Interframe Space)
DIFS (Distributed Interframe Space)
Signup and view all the flashcards
SIFS (Short Interframe Space)
SIFS (Short Interframe Space)
Signup and view all the flashcards
Contention Window
Contention Window
Signup and view all the flashcards
Successful Unicast Transmission
Successful Unicast Transmission
Signup and view all the flashcards
Successful Multicast or Broadcast Transmission
Successful Multicast or Broadcast Transmission
Signup and view all the flashcards
Slot Time
Slot Time
Signup and view all the flashcards
Backoff Interval
Backoff Interval
Signup and view all the flashcards
RTS/CTS (Request To Send/Clear To Send)
RTS/CTS (Request To Send/Clear To Send)
Signup and view all the flashcards
Study Notes
Computer Networking and IT Security (CNS)
- Course: INHH0012
- Semester: WiSe 2024/25
- Instructor: Prof. Dr.-Ing. Stephan Günther
- Institution: Technical University of Munich (TUM)
- Date: Saturday 2nd November, 2024
Chapter 2: Data Link Layer
- Focuses on Local Area Networks (LANs)
- Characterizes connections, multiple access, and access control
- Includes framing, addressing, and error detection
- Covers connecting nodes on Layers 1 and 2
- Discusses security considerations
- Presents a summary of the chapter content
Chapter 2: Data Link Layer: Representation of Networks as Graphs
- Uses graphs to represent networks
- Includes directed graphs and undirected graphs
- Explains paths in networks and network topologies
- Introduces adjacency and distance matrices
- Explains how to create tree structures
Directed Graphs
- Commonly used to represent network topologies and node connections
- An asymmetric network can be represented as a directed graph G = (N, A)
- N: Set of nodes/vertices
- A: Set of directed arcs {i, j} | i, j ∈ N ∧ i, j are connected by a directed arc}
- Example: N = {1, 2, 3, 4}, A = {(1, 2), (2, 3), (2, 4), (1, 4)}
Undirected Graphs
- Represents a symmetric network as an undirected graph G = (N, E)
- N: Set of nodes
- E: Set of (undirected) edges {i, j} | i, j ∈ N ∧ i, j are connected undirectedly}
- Example: N = {1, 2, 3, 4}, E = {{1, 2}, {2, 3}, {2, 4}, {1, 4}}
Paths in Networks
- A path between two nodes s, t ∈ N is a set Pst = {(s, i), (i, j),...,(k, l),(l, t)} of edges connecting s and t
- Path cost: Sum of costs of used edges: c(Pst) = ΣCij (i,j)∈Pst
- Path length: Number of intermediate nodes: I(Pst) = |Pst|
- Layer 3 path costs are often referred to as hop counts which are less common on Layer 2.
- Source and destination are commonly denoted as 's' and 't' respectively
Network Topologies
- Descriptions of how nodes are interconnected in a network
- Well-known Topologies: Point-to-point, Chain, Star, Mesh, Tree, Bus
Adjacency and Distance Matrix
- Adjacency matrix (A) represents connections between nodes in a network
- A(i, j) = 1 if there's a connection from node i to node j, otherwise 0
- Symmetric if A = AT
- Distance matrix (D) shows the shortest path cost between all node pairs.
- D(i, j) = cost of the shortest path of length 1 between nodes i and j
- D(i, i)= 0, dij= ∞ if no direct connection
Question and Answer About Adjacency and Distance Matrix
- Question: How do we get a matrix of the shortest path costs between any pair of nodes?
- Answer: Calculate powers of D with respect to the min-plus product
- (Dn with d = min {di-1 + dkj} for i, j, k ∈ N)
- The nth power (Dn) contains costs of shortest paths of length n hops or less.
Creating Tree Structures
- Trees are connected, loop-free graphs
- Two special types are discussed: Shortest Path Tree (SPT) and Minimum Spanning Tree (MST)
- SPT connects a root to all other nodes with minimum total cost.
- MST connects all nodes with minimum total cost for the needed arcs (unrooted tree).
Characterizing Connections, Media Access, ALOHA, CSMA, CSMA/CD, CSMA/CA, Token Passing
- Data rate, transmission delay, direction of transmission, and multiple access
- Different media access control methods:
- ALOHA (early wireless networking protocol)
- Slotted ALOHA
- CSMA/CSMA/CD
- CSMA/CA
- Token Passing
Addressing and Error Detection
- Unique node identification
- Broadcast and multicast addresses
- MAC addresses (Media Access Control)
- Error detection codes (e.g., checksums/cyclic redundancy checks (CRC)) are used to increase reliability)
- Handling of frame boundaries and code transparency (essential for reliable transmission and receiver recognition)
Security Considerations (Layer 2)
- CAM (Content Addressable Memory) poisoning, an attack where an attacker can forge MAC addresses and disrupt network communications.
- Denial of Service (DoS) attack is performed by flooding the switch with a large number of requests from arbitrary source addresses
- Mitigations for layer 2 attacks (e.g. Allowed source address, dynamic port security, automatic removal of obsolete entries)
- Cable and wireless security considerations (limiting access to the medium, authentication, wireless security standards, like WEP, WPA, WPA2, and WPA3)
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.